CVE-2022-39133: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8022
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-39133 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8022. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, indicating that the driver lacks proper bounds checking when handling certain data, which can lead to writing outside the allocated memory buffer. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. The impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, potentially causing the wireless network interface to crash or become unresponsive. The CVSS v3.1 score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits have been reported in the wild, and no patches have been explicitly linked, suggesting that mitigation may rely on vendor firmware or driver updates. The vulnerability affects the WLAN driver specifically, which is critical for network connectivity on affected devices. Given the nature of the flaw, exploitation would likely require local access to the device, such as through a malicious app or compromised user environment, to trigger the out-of-bounds write and cause WLAN service disruption.
Potential Impact
For European organizations, the primary impact of CVE-2022-39133 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets. This can result in denial of service conditions on mobile devices, impacting business continuity, especially for organizations relying heavily on mobile communications and wireless access. While the vulnerability does not compromise confidentiality or integrity, the loss of availability can hinder operations, delay communications, and reduce productivity. Sectors with high mobile device usage, such as telecommunications, logistics, and field services, may experience operational challenges. Additionally, organizations deploying Bring Your Own Device (BYOD) policies could face increased risk if employees use vulnerable devices, potentially leading to localized network outages or degraded service quality. The fact that exploitation requires local access limits the threat to scenarios where attackers have physical or software-level access to the device, reducing the risk of remote widespread attacks. However, targeted attacks or insider threats could leverage this vulnerability to disrupt wireless services.
Mitigation Recommendations
1. Device Inventory and Identification: Organizations should identify and inventory devices using Unisoc chipsets listed as affected, focusing on Android 10, 11, and 12 devices. 2. Firmware and Driver Updates: Engage with device manufacturers and vendors to obtain and deploy the latest firmware or driver updates that address this vulnerability. Even though no explicit patch links are provided, vendors may have released updates post-disclosure. 3. Restrict Local Access: Implement strict controls to prevent unauthorized local access to devices, including enforcing strong device lock policies, disabling installation of untrusted applications, and monitoring for suspicious local activity. 4. Application Whitelisting and Mobile Device Management (MDM): Use MDM solutions to control app installations and enforce security policies that reduce the risk of malicious apps exploiting the vulnerability. 5. Network Segmentation and Monitoring: Segment wireless networks and monitor WLAN service stability to quickly detect and respond to denial of service incidents potentially caused by exploitation attempts. 6. User Awareness: Educate users about the risks of installing untrusted applications and the importance of device security hygiene to minimize local exploitation opportunities. 7. Incident Response Preparedness: Prepare incident response plans to handle WLAN service disruptions, including fallback connectivity options and rapid device remediation procedures.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-39133: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8022
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-39133 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8022. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, indicating that the driver lacks proper bounds checking when handling certain data, which can lead to writing outside the allocated memory buffer. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. The impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, potentially causing the wireless network interface to crash or become unresponsive. The CVSS v3.1 score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits have been reported in the wild, and no patches have been explicitly linked, suggesting that mitigation may rely on vendor firmware or driver updates. The vulnerability affects the WLAN driver specifically, which is critical for network connectivity on affected devices. Given the nature of the flaw, exploitation would likely require local access to the device, such as through a malicious app or compromised user environment, to trigger the out-of-bounds write and cause WLAN service disruption.
Potential Impact
For European organizations, the primary impact of CVE-2022-39133 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets. This can result in denial of service conditions on mobile devices, impacting business continuity, especially for organizations relying heavily on mobile communications and wireless access. While the vulnerability does not compromise confidentiality or integrity, the loss of availability can hinder operations, delay communications, and reduce productivity. Sectors with high mobile device usage, such as telecommunications, logistics, and field services, may experience operational challenges. Additionally, organizations deploying Bring Your Own Device (BYOD) policies could face increased risk if employees use vulnerable devices, potentially leading to localized network outages or degraded service quality. The fact that exploitation requires local access limits the threat to scenarios where attackers have physical or software-level access to the device, reducing the risk of remote widespread attacks. However, targeted attacks or insider threats could leverage this vulnerability to disrupt wireless services.
Mitigation Recommendations
1. Device Inventory and Identification: Organizations should identify and inventory devices using Unisoc chipsets listed as affected, focusing on Android 10, 11, and 12 devices. 2. Firmware and Driver Updates: Engage with device manufacturers and vendors to obtain and deploy the latest firmware or driver updates that address this vulnerability. Even though no explicit patch links are provided, vendors may have released updates post-disclosure. 3. Restrict Local Access: Implement strict controls to prevent unauthorized local access to devices, including enforcing strong device lock policies, disabling installation of untrusted applications, and monitoring for suspicious local activity. 4. Application Whitelisting and Mobile Device Management (MDM): Use MDM solutions to control app installations and enforce security policies that reduce the risk of malicious apps exploiting the vulnerability. 5. Network Segmentation and Monitoring: Segment wireless networks and monitor WLAN service stability to quickly detect and respond to denial of service incidents potentially caused by exploitation attempts. 6. User Awareness: Educate users about the risks of installing untrusted applications and the importance of device security hygiene to minimize local exploitation opportunities. 7. Incident Response Preparedness: Prepare incident response plans to handle WLAN service disruptions, including fallback connectivity options and rapid device remediation procedures.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf155e
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/24/2025, 2:59:26 AM
Last updated: 8/13/2025, 11:10:39 PM
Views: 13
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.